Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11043: CWE-295 Improper Certificate Validation in B&R Industrial Automation GmbH B&R Automation Studio

0
Critical
VulnerabilityCVE-2025-11043cvecve-2025-11043cwe-295
Published: Mon Jan 19 2026 (01/19/2026, 15:52:14 UTC)
Source: CVE Database V5
Vendor/Project: B&R Industrial Automation GmbH
Product: B&R Automation Studio

Description

An Improper Certificate Validation vulnerability in the OPC-UA client and ANSL over TLS client used in Automation Studio versions before 6.5 could allow an unauthenticated attacker on the network to position themselves to intercept and interfere with data exchanges.

AI-Powered Analysis

AILast updated: 01/26/2026, 19:52:59 UTC

Technical Analysis

CVE-2025-11043 identifies a critical security vulnerability in B&R Industrial Automation GmbH's Automation Studio software, specifically versions before 6.5. The vulnerability stems from improper certificate validation (CWE-295) within the OPC-UA client and ANSL over TLS client components. OPC-UA (Open Platform Communications Unified Architecture) is widely used in industrial automation for secure and reliable data exchange between devices and control systems. The improper validation flaw allows an unauthenticated attacker positioned on the same network segment to perform man-in-the-middle (MitM) attacks by intercepting and potentially altering communications between Automation Studio clients and servers. This compromises the confidentiality and integrity of sensitive industrial control data. The CVSS 4.0 vector (AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N) indicates network attack vector, low complexity, no privileges or user interaction required, and high impact on confidentiality and integrity. Although no exploits are currently known in the wild, the vulnerability poses a significant risk due to the critical role of Automation Studio in industrial environments. The lack of patch links suggests that a fix may be forthcoming or that users should upgrade to version 6.5 or later to remediate the issue. Attackers exploiting this flaw could disrupt industrial processes, steal sensitive operational data, or inject malicious commands, potentially causing physical damage or operational downtime.

Potential Impact

For European organizations, especially those in manufacturing, energy, and critical infrastructure sectors relying on B&R Automation Studio, this vulnerability could lead to severe operational disruptions. Successful exploitation allows attackers to intercept and manipulate industrial control communications, risking unauthorized control over machinery, data theft, and sabotage. The confidentiality breach could expose sensitive operational data or intellectual property, while integrity compromise could result in incorrect commands being executed, leading to safety hazards or production losses. Given the widespread use of OPC-UA in European industrial automation, the vulnerability threatens the reliability and safety of critical industrial processes. The absence of required authentication and user interaction lowers the barrier for attackers, increasing the likelihood of exploitation in poorly segmented or monitored networks. This could also impact supply chains and critical infrastructure resilience within Europe.

Mitigation Recommendations

Organizations should prioritize upgrading B&R Automation Studio to version 6.5 or later where the vulnerability is addressed. Until patches are applied, network segmentation should be enforced to isolate industrial control systems and limit attacker access to OPC-UA communications. Deploying network intrusion detection systems (NIDS) with signatures or anomaly detection for OPC-UA traffic can help identify suspicious interception attempts. Implement strict TLS certificate management policies, including certificate pinning where possible, to detect and prevent MitM attacks. Regularly audit and monitor network traffic between Automation Studio clients and servers for unexpected certificate changes or unusual communication patterns. Additionally, enforce strong physical and logical access controls to prevent unauthorized network access. Collaborate with B&R support and industrial cybersecurity experts to validate remediation steps and ensure comprehensive protection.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
ABB
Date Reserved
2025-09-26T09:17:05.598Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 696e543dd302b072d9cb38b8

Added to database: 1/19/2026, 3:56:45 PM

Last enriched: 1/26/2026, 7:52:59 PM

Last updated: 2/6/2026, 12:41:30 AM

Views: 44

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats